Efficient and flexible anonymization of transaction data

被引:0
|
作者
Grigorios Loukides
Aris Gkoulalas-Divanis
Jianhua Shao
机构
[1] Cardiff University,School of Computer Science and Informatics
[2] IBM Research-Ireland,Smarter Cities Technology Centre
来源
关键词
Anonymity; Privacy; Transaction data; Privacy requirements; Identity disclosure; Sensitive information disclosure; Efficiency; Scalability;
D O I
暂无
中图分类号
学科分类号
摘要
Transaction data are increasingly used in applications, such as marketing research and biomedical studies. Publishing these data, however, may risk privacy breaches, as they often contain personal information about individuals. Approaches to anonymizing transaction data have been proposed recently, but they may produce excessively distorted and inadequately protected solutions. This is because these approaches do not consider privacy requirements that are common in real-world applications in a realistic and flexible manner, and attempt to safeguard the data only against either identity disclosure or sensitive information inference. In this paper, we propose a new approach that overcomes these limitations. We introduce a rule-based privacy model that allows data publishers to express fine-grained protection requirements for both identity and sensitive information disclosure. Based on this model, we also develop two anonymization algorithms. Our first algorithm works in a top-down fashion, employing an efficient strategy to recursively generalize data with low information loss. Our second algorithm uses sampling and a combination of top-down and bottom-up generalization heuristics, which greatly improves scalability while maintaining low information loss. Extensive experiments show that our algorithms significantly outperform the state-of-the-art in terms of retaining data utility, while achieving good protection and scalability.
引用
收藏
页码:153 / 210
页数:57
相关论文
共 50 条
  • [31] A flexible approach to intrusion alert anonymization and correlation
    Xu, Dingbang
    Ning, Peng
    2006 SECURECOMM AND WORKSHOPS, 2006, : 154 - +
  • [32] A Flexible In-Network IP Anonymization Service
    Mendonca, Marc
    Seetharaman, Srini
    Obraczka, Katia
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012, : 6651 - 6656
  • [33] Flexible sensitive K-anonymization on transactions
    Yu-Chuan Tsai
    Shyue-Liang Wang
    I-Hsien Ting
    Tzung-Pei Hong
    World Wide Web, 2020, 23 : 2391 - 2406
  • [34] Efficient, energy conserving transaction processing in wireless data broadcast
    Lee, SangKeun
    Hwang, Chong-Sun
    Kitsuregawa, Masaru
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2006, 18 (09) : 1225 - 1238
  • [35] Efficient dissemination of transaction-consistent data in broadcast environments
    Young, Cheng-Ru
    Chiu, Ge-Ming
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2007, 19 (03) : 384 - 397
  • [36] Flexible sensitive K-anonymization on transactions
    Tsai, Yu-Chuan
    Wang, Shyue-Liang
    Ting, I-Hsien
    Hong, Tzung-Pei
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2020, 23 (04): : 2391 - 2406
  • [37] An Efficient Approach for Spatial Trajectory Anonymization
    Wang, Yuetian
    Hua, Wen
    Jin, Fengmei
    Qiu, Jing
    Zhou, Xiaofang
    WEB INFORMATION SYSTEMS ENGINEERING - WISE 2021, PT I, 2021, 13080 : 575 - 590
  • [38] Analysis of Data Anonymization Techniques
    Marques, Joana Ferreira
    Bernardino, Jorge
    PROCEEDINGS OF THE 12TH INTERNATIONAL JOINT CONFERENCE ON KNOWLEDGE DISCOVERY, KNOWLEDGE ENGINEERING AND KNOWLEDGE MANAGEMENT (KEOD), VOL 2, 2020, : 235 - 241
  • [39] Android Sensor Data Anonymization
    Claiborne, Cynthia
    Fazeen, Mohamed
    Dantu, Ram
    RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, 2013, 8145 : 469 - 471
  • [40] A macro for efficient and flexible data smoothing
    Cucka, J
    PROCEEDINGS OF THE TWENTY-SECOND ANNUAL SAS USERS GROUP INTERNATIONAL CONFERENCE, 1997, : 461 - 464